Wednesday, December 10, 2014

IT Policy

The University’s information technology policies and guidelines apply to users of its resources whether or not they are members of the University. It also applies to all uses of those resources, whether on campus or from remote locations.
The University’s information technology policies and guidelines are reviewed annually by the IT Steering Council and updated accordingly. Individual units within the University may issue additional policies and guidelines for resources under their control. Such additional policies and guidelines must be consistent with the University’s information technology policies and guidelines. These additional policies and guidelines must be reviewed and formally approved by the Assistant to the Vice Chancellor for Policy and Process before implementation.
Violations of information technology policies are treated in the same way as a violation of any other University policy as governed by the University Laws and Bylaws, General Rules of Conduct for all University Employees, and University of Connecticut Student Conduct Code.
University IT Policies:
Policies & Procedures Website – All IT Policies
Official State of Connecticut Policies:
Acceptable Use Policy
Limits on the Use of State Telephones (Memorandum 85-39)
Universal Website Accessibility Policy
University IT Standards, Guidelines, and Recommendations:
Electronic Data Transport Standard
Fair Use of Copyrighted Works Guidelines
Guidelines for Departmental/Unit Web Pages
Guidelines for Managing E-Mail
Individual Workstation Security Guidelines
IT Security Standards
LAN Security Guidelines
Laptop/Portable Computer Security Guidelines
Operational Procedures for Official E-Mail Lists
Outlook Email Security Guidelines
Password Guidelines
Physical Security Standards
Procedures for Handling Confidential and Registered Confidential Data
Sensitive University Data Quick Reference Chart
Sensitive University Information Checklist
Technical Standard for Data Backups
Website Development and Design Standards
UITS Standard – Copying University Data
Other Documents:
Procedure for Handling Digital Millennium Copyright Act (DMCA) Complaints
Template of first notification of complaint letter
Template of second notification of complaint letter for faculty and staff
Template of second notification of complaint letter for students
Notice to Students Concerning RIAA Efforts – August 2007
Procedures for locating and removing sensitive data stored on computer hard drives.
Procedures for Removing (Wiping) Data from a Computer Prior to Re-Deployment Surplus or Disposal
Privacy Notice Statement
Security Risk Self-Assessment Process Instructions
Inventory and Description template
IT Security Risk Assessment template
Business Continuity Plan template
Common Information Systems Assets reference document
Common Threats reference document
Common Vulnerabilities reference document
UITS Rules of Conduct with Respect to Confidential Information.
UITS Procedures for Secure Shredding of Confidential Data – Sensitive Paper Documents.

No comments:

Post a Comment